EP1592195A2 - Station mobile et procédé de contrôle de communications - Google Patents

Station mobile et procédé de contrôle de communications Download PDF

Info

Publication number
EP1592195A2
EP1592195A2 EP05008812A EP05008812A EP1592195A2 EP 1592195 A2 EP1592195 A2 EP 1592195A2 EP 05008812 A EP05008812 A EP 05008812A EP 05008812 A EP05008812 A EP 05008812A EP 1592195 A2 EP1592195 A2 EP 1592195A2
Authority
EP
European Patent Office
Prior art keywords
connection
mobile station
security level
external device
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP05008812A
Other languages
German (de)
English (en)
Other versions
EP1592195B1 (fr
EP1592195A3 (fr
Inventor
Mao Int. Prop. Dpt. NTT DoCoMo Inc. Asai
Tatsuro Int. Prop. Dpt. NTT DoCoMo Inc. Ol
Masaharu I.P.D. NTT DoCoMo Inc. Nakatsuchi
Kosuke Int.Pro. Dpt. NTT DoCoMo Inc. Kakuno
Akira Int.Pro. Dpt. NTT DoCoMo Inc. Shibutani
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NTT Docomo Inc
Original Assignee
NTT Docomo Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NTT Docomo Inc filed Critical NTT Docomo Inc
Publication of EP1592195A2 publication Critical patent/EP1592195A2/fr
Publication of EP1592195A3 publication Critical patent/EP1592195A3/fr
Application granted granted Critical
Publication of EP1592195B1 publication Critical patent/EP1592195B1/fr
Not-in-force legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Definitions

  • the present invention relates to a procedure for a mobile station to make a connection with an external device while maintaining a predetermined security level.
  • Patent Document 1 Japanese Patent Application Laid-Open No. 2002-281558
  • the aforementioned conventional technology has a problem of concern that, depending upon the security level of the communication partner, the mobile station is not allowed to communicate with the external device in spite of a user's desire.
  • One of effective means for solving this problem is to assure security at a high level, such as input of PIN (Personal Identification Number), for all applications requiring connection with an external device.
  • PIN Personal Identification Number
  • An object of the present invention is therefore to enable a mobile station to quickly establish communication while maintaining security at a certain level, by changing a connection procedure with an external device, according to a security level set in an application.
  • a mobile station comprises: activating means for activating an application to communicate with an external device; acquiring means for acquiring a security level set in the application activated by the activating means; and connection means for making a connection with the external device by a procedure according to the security level acquired by the acquiring means.
  • a communication control method is a communication control method comprising the following steps carried out by a mobile station: an activating step of activating an application to communicate with an external device; an acquiring step of acquiring a security level set in the application activated in the activating step; and a connection step of making a connection with the external device by a procedure according to the security level acquired in the acquiring step.
  • the connection procedure between the mobile station and the external device is determined according to the security level set in the application for performing communication with the external device. Specifically, when a high security level is set in the activated application, a stricter condition for connection is applied; e.g., the external device is demanded to transmit a PIN. On the other hand, when a low security level is set in the activated application, a looser condition for connection is applied; for example, the request for transmission of a PIN to the external device is omitted.
  • the mobile station changes the connection procedure with the external device according to the security level set in the application, the mobile station circumvents indiscriminate execution of complicated authentication and encryption on the occasion of communication with a communication partner not requiring a so high security level, such as a registered external device. As a result, it becomes feasible to quickly establish communication between the mobile station and the external device while maintaining security at a certain level.
  • the mobile station according to the present invention may be configured in a configuration further comprising selecting means for selecting an external device that can undergo an automatic connection using an application with a high security level set therein, wherein when the security level acquired by the acquiring means is the high security level, the connection means makes the automatic connection with the external device selected by the selecting means.
  • connection at the high security level can eliminate connection with unauthorized third parties as much as possible, even in cases where the automatic connection is attempted without intervention of a user operation.
  • the automatic connection with the external device is executed if the user permits the automatic connection and only if the high security level is set in the application in action. This enables the mobile station to quickly establish communication by the simple procedure without need for a user operation, while maintaining the fixed security level.
  • the mobile station according to the present invention can also be configured in a configuration further comprising selecting means for selecting an external device that can undergo a connection using an application with a high security level set therein, wherein when the security level acquired by the acquiring means is the high security level, the connection means makes the connection with the external device on the occasion of receiving a connection request from the external device selected by the selecting means.
  • the mobile station according to the present invention can manage connection targets at the high security level in a lump, it functions more effectively as the number of connection requests from external devices increases.
  • connection means makes the connection between the mobile station and the external device by use of BLUETOOTH (registered trademark).
  • the communication used for the connection between the mobile station and the external device is preferably, for example, BLUETOOTH communication. Since BLUETOOTH permits one-to-multiple connections in its standard and can be installed in many types of devices, it has many advantages suitable for consumer products. For this reason, it is necessary to anticipate unauthorized use by third parties on one hand and to adequately consider user's convenience on the other hand. Accordingly, the application of the technology according to the present invention to the BLUETOOTH communication can more effectively bring about the aforementioned effect of enabling quick communication while maintaining the security.
  • the present invention involves changing the connection procedure with the external device in accordance with the security level set in the application, and thereby enables quick establishment of communication while maintaining security at the predetermined level.
  • Fig. 1 is a block diagram showing a functional configuration of mobile station 10.
  • the mobile station 10 has an application storage 11, an application executing part 12 (corresponding to the activating means), a device searching part 13, a display part 14, an input part 15 (corresponding to the selecting means), a security level acquirer 16 (corresponding to the acquiring means), and a BLUETOOTH connection part 17 (corresponding to the connection means).
  • These parts are connected so as to be able to implement input/output of various signals through a bus.
  • the application storage 11 is physically comprised of an embedded memory such as an EEPROM (Electrically Erasable and Programmable Read Only Memory).
  • the application storage 11 stores a plurality of application programs that the mobile station 10 can execute by use of BLUETOOTH.
  • the application programs are, for example, those of i- ⁇ ppli (registered trademark).
  • each application program is correlated with an ADF (Application Description File), and a security level is set in each of these ADFs.
  • the mobile station 10 changes the procedure of connection according to the security level.
  • the ADFs of all the application programs making use of BLUETOOTH must contain a description of UseBluetooth key. For example, when a parameter of the UseBluetooth key described in an ADF is "high,” the mobile station 10 executes a connection at a high security level, i.e., a connection procedure including the authentication and encryption by input of PIN. On the other hand, when the parameter is "low,” the mobile station 10 executes a connection at a low security level, i.e., a connection procedure without the authentication and encryption by input of PIN.
  • the parameter is described in the ASCII format and is case-insensitive.
  • the application executing part 12 retrieves this application from the application storage 11 into a memory area.
  • the application executing part 12 instructs the device searching part 13 to search for external devices.
  • the external devices as targets of the search are external devices that exist within a transmission range (e.g., approximately 10-100 m in radius) of the mobile station 10 and that can undergo a BLUETOOTH connection.
  • the application executing part 12 outputs the security level described in the ADF of the application in action, in response to a request from the after-described security level acquirer 16.
  • the device searching part 13 When receiving a connection command from an application in action, the device searching part 13 sends out a search signal to surroundings (polling) to search for external devices as candidates for BLUETOOTH connection.
  • the aforementioned application executing part 12 is notified of the external devices detected as a result of the search.
  • external devices 20, 30, and 40 are detected in the present embodiment, and thus identification information of these devices is outputted from the device searching part 13 to the application executing part 12.
  • the display part 14 presents the result of the search by the device searching part 13 to the user of the mobile station 10 in accordance with a command from the application executing part 12.
  • the display part 14 displays connection records with the detected external devices in a form that the user can visually recognize.
  • the input part 15 is composed of a button as hardware and, when detecting a push or contact operation on the button by the user, the input part 15 instructs the application executing part 12 to execute the application.
  • the input part 15 performs selection of an external device with which the mobile station 10 attempts to connect, out of the external devices displayed on the display part 14, in accordance with a user's selection operation.
  • the input part 15 selects a specific external device out of a plurality of external devices registered in advance, in accordance with a selection operation according to a purpose of the user.
  • the specific external device is, for example, an external device as a communication partner when the mobile station 10 performs an automatic connection by use of an application with the high security level set therein. In this case, the mobile station 10 transmits a connection request to the specific external device.
  • the specific external device is also an external device as a communication partner when the mobile station 10 is searched and connected by use of an application with the high security level set therein. In this case, the specific external device transmits a connection request to the mobile station 10.
  • the security level acquirer 16 asks the application executing part 12 about the security level ("high” or "low") described in the ADF of the application in action to acquire it.
  • the security level acquirer 16 instructs the BLUETOOTH connection part 17 to make a BLUETOOTH connection using a procedure based on the acquired security level.
  • FIGs. 3 to 6 are flowcharts for explaining BLUETOOTH connection processes according to communication partners selected.
  • the BLUETOOTH connection processes are implemented by coordinated operation of the components of the mobile station 10, but Figs. 3 to 6 are depicted based on classification of process-executing entities into an ordinary application and a native application for convenience' sake of description.
  • the ordinary application is, for example, i- ⁇ ppli and is described as "application” in the drawings.
  • the native application is, for example, an address book or a browser, and is abbreviated as "native” in the drawings.
  • the external devices 20, 30, and 40 are detected as candidates for a communication partner of BLUETOOTH connection.
  • the external device 20 is a cell phone of Ichiro Suzuki and has a previous connection record at the high security level. Namely, the mobile station 10 contains a link key registered.
  • the external device 30 is a PHS (Personal Handyphone System) of Jiro Tanaka, and has a previous connection record at the low security level only. Therefore, the mobile station 10 contains a device name registered but no link key registered. There is no connection record of the external device 40.
  • the application executing part 12 of the mobile station 10 first activates an application for providing a service desired by the user.
  • the activation of the application may be automatic activation triggered by detection of an external device or manual activation by a command from the user of the mobile station 10.
  • the application outputs a command for BLUETOOTH connection (connect(long cod)) to the native.
  • a command for BLUETOOTH connection connect(long cod)
  • Examples of cases where an exception occurs include a case where the aforementioned UseBluetooth key is not described in the ADF, a case where the parameter of the UseBluetooth key described in the ADF is a character string except for "high” and "low,” a case where the BLUETOOTH connection is rejected in the setting of the application, and so on.
  • the mobile station 10 is desirably configured to draw user's attention with its content.
  • the native sends out a search signal (Inquiry) to search for a plurality of external devices including the external device 20 (S3).
  • the external devices 20, 30, and 40 capable of BLUETOOTH connection send a search response signal (Inquiry Response) in order to notify the mobile station 10 of the detection (S4).
  • the native makes the display part 14 display UIs (User Identifications) of the detected external devices, as a result of the search for devices. These external devices are candidates for a communication partner.
  • the user of the mobile station 10 selects the external device 20 as a communication partner desired for BLUETOOTH connection, through the input part 15 (S5).
  • the external device 20 corresponds to the cell phone of Mr. Ichiro Suzuki.
  • Fig. 4(a) shows a state of the display part 14 where the "cell phone of Ichiro Suzuki" is selected as a communication partner.
  • the native manages information about communication partners.
  • the information about a communication partner is, for example, BD_ADDR, a device name, a link key, and an encryption key.
  • BD_ADDR is an address specific to each BLUETOOTH connection, which can be displayed for the user, but which cannot be changed by the user (though it can be deleted).
  • the device name is a character string (e.g., cell phone of Ichiro Suzuki) personally registered by the user, which can be subjected to all the processes of display, change, and deletion.
  • the link key is a 128-bit authentication key, and is automatically registered between mobile station 10 and external device 20 upon a connection at the high security level. The link key cannot be displayed for the user but can be deleted by the user.
  • the encryption key is a 128-bit encryption key, and is automatically registered between mobile station 10 and external device 20 upon a connection at the high security level. The encryption key cannot be displayed for the user, but can be deleted by the user only in conjunction with the link key.
  • BD_ADDR of a communication partner, the device name registered on the partner side, etc. were displayed as UI upon a search for external devices by BLUETOOTH. For this reason, there were problems that it was difficult for the user of the mobile station 10 on the searching side to identify the communication partners and that there was a possibility of spoofing.
  • the device name registered on the searching side is displayed for each communication partner already registered in a database of the native on the searching side, and a communication partner not registered on the searching side is displayed by its BD_ADDR on the searching side. Therefore, the aforementioned problems are overcome.
  • mark indicates a communication partner with a link key, i.e., a communication partner whose device name is registered and with which a connection has been made at the high security level.
  • mark indicates a communication partner without a link key, i.e., a communication partner whose device name is registered but with which no connection has been made at the high security level.
  • each UI without any mark (“XXXXXX" in the same figure) indicates a communication partner not registered.
  • the user of the mobile station 10 can readily check the reliability of the desired communication partner before establishment of connection. Since the mobile station 10 displays the result of the search for a communication partner on the native screen, it can also be expected to provide the effect of preventing the application from taking the liberty to rewrite BD_ADDR and display the rewritten BD_ADDR.
  • connection button 141 The user of the mobile station 10 performs a selection operation on a connection button 141 to instruct a connection with the external device 20 selected as a communication partner.
  • the native transmits a connection request signal (Page) to the external device 20.
  • the external device 20 receives the connection request signal, the external device 20 sends a request response signal (PageResponse) to the mobile station 10 (S7).
  • the mobile station 10 makes the security level acquirer 16 acquire the security level from the ADF of the application activated at S1 (S8).
  • the mobile station 10 refers to the UseBluetooth key described in the ADF to determine whether the security level set in the application is high or low (S9).
  • the mobile station 10 determines that the security level of the application in action is high, and moves to S10.
  • the authentication and encryption processes are carried out between external device 20 as a communication partner and mobile station 10.
  • the processes of authentication and encryption are well-known communication security technologies and thus omitted from detailed description.
  • the authentication process is to examine the validity of the communication partner and thereby prevent unauthorized access
  • the encryption process is to encrypt transmitted and received data and thereby assure confidentiality of communication.
  • the link key thereof is already registered as described above, and thus there is no need for input of PIN in the authentication.
  • the user of the mobile station 10 preliminarily sets the propriety of automatic connection with each external device under setting of the high security level. This enables the mobile station 10 to refer to the set content and automatically make a connection with an external device permitted to make an automatic connection. Since the automatic connection does not require the user to input a PIN or the like, it is desirably executed only with a reliable communication partner. In this respect, external devices as targets for the automatic connection are limited to devices designated by the user, and communication with the devices is executed at the high security level. For this reason, the automatic connection with high convenience to the user is implemented while assuring high security.
  • a link is established by BLUETOOTH between mobile station 10 and external device 20.
  • a PAN_EVENT_CONNECTED signal is sent to notify the application of the fact.
  • the mobile station 10 may be configured to present the security level currently applied, during the BLUETOOTH connection.
  • the presentation can be implemented, for example, by adopting a technique of displaying a character string indicating the security level, or a technique of changing the color of an icon indicating a progress of communication, according to the security level. This permits the user to readily and quickly grasp at which security level the communication is under way with the communication partner.
  • This BLUETOOTH connection process includes a plurality of steps common to the BLUETOOTH connection process detailed with reference to Fig. 3. Specifically, processes at S21-S29, S31, and S32 in Fig. 5 are equivalent to those at S1-S9, S10, and S11, respectively, shown in Fig. 3. However, these processes are somewhat different in detail and, particularly, the communication partner selected at S25 is the PHS of Jiro Tanaka.
  • Fig. 4(b) shows a state of the display part 14 where the "PHS of Jiro Tanaka" is selected as a communication partner.
  • the BLUETOOTH connection process includes a plurality of steps common to the BLUETOOTH connection process detailed with reference to Fig. 3. Specifically, processes at S41-S49, S51, and S52 in Fig. 6 are equivalent to those at S1-S9, S10, and S11, respectively, shown in Fig. 3. However, these processes are different in that the communication partner selected at S45 is the external device 40 not registered.
  • a connection with an unregistered device is selected as in this mode, it is desirable to display a dialog screen 142 to inquire the necessity of registration of the user, in combination with a detected device list (cf. Fig. 4(c)), in consideration of occasions of reconnection.
  • the mobile station 10 may also be configured to simultaneously notify the user that the target to which a connection is attempted is not registered, by wording to draw attention.
  • the other processes at S50 and S52 are the same processes as at S30 and S32, respectively, shown in Fig. 5.
  • the mobile station 10 of the present embodiment performs the BLUETOOTH connection with the external device selected as a communication partner by the user of the mobile station 10, out of the plurality of external devices 20, 30, and 40 detected in conjunction with activation of the application.
  • the external devices are generally classified under three types, registered (with a link key), registered (without a link key), and unregistered, depending upon differences of connection records.
  • the mobile station 10 changes the procedure for connection with the external device by BLUETOOTH, according to the security level set in the application activated. Specifically, where the low security level is set in the application, the mobile station 10 omits the processes of device authentication and encryption, irrespective of the differences of connection records. This simplifies the connection procedure and reduces the connection time.
  • the mobile station 10 executes the processes of device authentication and encryption, irrespective of the differences of connection records. This circumvents connections with unauthorized third parties and assures predetermined communication security.
  • the security level can be variably set according to a kind of a service implemented by the application. Namely, a developer can develop an application with a security level suitable for an individual service.
  • the present invention is not limited to the embodiment described above, and can be properly modified in various modification forms, without departing from the spirit and scope of the invention.
  • the terminal for changing the display method of the search result according to the security level was the mobile station 10, i.e., the terminal that performed the search by transmission of the search signal.
  • the technology of the present invention is also applicable to cases where the mobile station 10 is a terminal that is searched by reception of a transmitted search signal (accept command). In this mode, the mobile station 10 changes a display method of a connection request entity (searching entity) according to the security level.
  • the user of the mobile station 10 registers the propriety of connection for each external device in the case where the high security level is set in an application, as a preliminary process.
  • the propriety of connection is whether acceptance of a connection request is to be permitted or rejected, in other words.
  • the mobile station 10 ignores a connection request from an external device not permitted to connect by the user, according to the registered content.
  • the mobile station 10 displays the UI of the external device on the display part 14.
  • the mobile station 10 accepts a connection request from all the external devices, regardless of their connection records, and displays UIs of these devices in time series.
  • the aforementioned process preliminarily narrows down partners for which the connection request (search) is accepted. For this reason, the number of responses manually sent in response to the request is reduced for the user on the searched side (mobile station 10). This results in reducing the time and effort necessary for establishment of a link between mobile station 10 and an external device.
  • the above embodiment adopted the authentication process and encryption process based on the input of PIN as means for assuring security at the high level.
  • the mobile station 10 variably sets the propriety of automatic connection and disables the automatic connection only if the high security level is set in the application in action. This gets rid of concern that data is transmitted and received against user's intention between the mobile station 10 and an external device not going through the authentication process.
  • the mobile station 10 is, for example, a cell phone, but may be any information equipment provided with a communication function, such as a PDA (Personal Digital Assistance) or a PHS, and the function and size thereof do not limit objects to which the present invention is applied. Furthermore, the above embodiment was configured on the assumption of the BLUETOOTH communication as short-range wireless communication between mobile station 10 and external devices 20, 30, 40. However, it is a matter of course that the present invention is also applicable to infrared communication including IrDA (Infrared Data Association) and to wireless LAN (Local Area Network) communication.
  • IrDA Infrared Data Association
  • wireless LAN Local Area Network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
EP05008812.9A 2004-04-28 2005-04-21 Station mobile et procédé de contrôle de communications Not-in-force EP1592195B1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2004134262A JP3817249B2 (ja) 2004-04-28 2004-04-28 移動機、及び、通信制御方法
JP2004134262 2004-04-28

Publications (3)

Publication Number Publication Date
EP1592195A2 true EP1592195A2 (fr) 2005-11-02
EP1592195A3 EP1592195A3 (fr) 2009-06-17
EP1592195B1 EP1592195B1 (fr) 2014-12-31

Family

ID=34935570

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05008812.9A Not-in-force EP1592195B1 (fr) 2004-04-28 2005-04-21 Station mobile et procédé de contrôle de communications

Country Status (6)

Country Link
US (1) US7716475B2 (fr)
EP (1) EP1592195B1 (fr)
JP (1) JP3817249B2 (fr)
CN (1) CN1691812A (fr)
ES (1) ES2533831T3 (fr)
TW (1) TWI263452B (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012114906A (ja) * 2010-11-22 2012-06-14 Samsung Electronics Co Ltd 携帯用端末機におけるアクセスポイント接続装置及びその方法

Families Citing this family (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7545795B2 (en) * 2004-08-05 2009-06-09 Broadcom Corporation Method for identification using bluetooth wireless key
US8090105B2 (en) * 2004-11-24 2012-01-03 International Business Machines Corporation Broadcast encryption with dual tree sizes
US8787967B2 (en) * 2005-08-23 2014-07-22 Sony Corporation Communication terminals with pull-based digital information distribution capability and pull-based methods for digital information distribution
KR100774292B1 (ko) * 2005-10-25 2007-11-08 삼성전자주식회사 이동통신단말기에서 블루투스 자동 연결 방법
KR100659253B1 (ko) * 2005-11-07 2006-12-20 삼성전자주식회사 휴대용 단말기에서 블루투스 장치 검색 방법
KR101192016B1 (ko) 2005-11-21 2012-10-16 엘지전자 주식회사 무선 범용 시리얼 버스의 통신 방법
US7877815B2 (en) * 2006-01-20 2011-01-25 Kyocera Corporation Battery authentication in a wireless communication device
US8037522B2 (en) * 2006-03-30 2011-10-11 Nokia Corporation Security level establishment under generic bootstrapping architecture
US7668507B2 (en) * 2006-06-15 2010-02-23 Sony Ericsson Mobile Communications Ab Short range connectivity usability by using contact information
JP4864592B2 (ja) * 2006-08-08 2012-02-01 ソフトバンクモバイル株式会社 移動体通信端末及びその移動体通信端末を備えたシステム
US8935733B2 (en) * 2006-09-07 2015-01-13 Porto Vinci Ltd. Limited Liability Company Data presentation using a wireless home entertainment hub
US9233301B2 (en) 2006-09-07 2016-01-12 Rateze Remote Mgmt Llc Control of data presentation from multiple sources using a wireless home entertainment hub
US9319741B2 (en) * 2006-09-07 2016-04-19 Rateze Remote Mgmt Llc Finding devices in an entertainment system
US8607281B2 (en) 2006-09-07 2013-12-10 Porto Vinci Ltd. Limited Liability Company Control of data presentation in multiple zones using a wireless home entertainment hub
US9386269B2 (en) 2006-09-07 2016-07-05 Rateze Remote Mgmt Llc Presentation of data on multiple display devices using a wireless hub
US8966545B2 (en) * 2006-09-07 2015-02-24 Porto Vinci Ltd. Limited Liability Company Connecting a legacy device into a home entertainment system using a wireless home entertainment hub
US9806772B2 (en) * 2007-01-06 2017-10-31 Apple Inc. Apparatuses and methods that facilitate the transfer of power and information among radio frequency-based devices
JP4815359B2 (ja) * 2007-01-15 2011-11-16 株式会社リコー 画像形成装置
KR101496329B1 (ko) * 2008-03-28 2015-02-26 삼성전자주식회사 네트워크의 디바이스 보안 등급 조절 방법 및 장치
US8225106B2 (en) * 2008-04-02 2012-07-17 Protegrity Corporation Differential encryption utilizing trust modes
DE102009032466B4 (de) * 2008-07-16 2017-03-02 Infineon Technologies Ag Sicherheit in Netzwerken
US9160753B2 (en) * 2009-05-22 2015-10-13 Raytheon Company Analog voice bridge
JP5321266B2 (ja) * 2009-06-15 2013-10-23 富士通モバイルコミュニケーションズ株式会社 無線通信端末
JP5369920B2 (ja) * 2009-06-12 2013-12-18 富士通モバイルコミュニケーションズ株式会社 無線通信装置および無線通信方法
US8775801B2 (en) 2009-06-12 2014-07-08 Fujitsu Mobile Communications Limited Radio communication apparatus and radio communication method
JP5353611B2 (ja) * 2009-09-30 2013-11-27 富士通モバイルコミュニケーションズ株式会社 無線通信装置及び無線通信方法
JP5436195B2 (ja) * 2009-12-22 2014-03-05 キヤノン株式会社 画像処理装置、制御方法、及びプログラム
CN102075217B (zh) * 2010-12-22 2014-04-30 华为终端有限公司 蓝牙连接的管理方法及设备
KR101868018B1 (ko) * 2011-02-09 2018-06-18 삼성전자주식회사 기기간 연결 제어 방법 및 그 장치
WO2013002547A2 (fr) 2011-06-30 2013-01-03 주식회사 케이티 Terminal portable apte à une connexion avec un dispositif externe et procédé pour sa commande
KR101554599B1 (ko) 2011-06-30 2015-09-21 주식회사 케이티 외부 디바이스와 도킹 연결되는 휴대 단말 및 어플리케이션 실행 방법
US8381282B1 (en) 2011-09-30 2013-02-19 Kaspersky Lab Zao Portable security device and methods for maintenance of authentication information
KR101474927B1 (ko) 2011-12-22 2014-12-31 주식회사 케이티 외부 디스플레이 기기로의 영상 송출 방법 및 그 단말
KR101522399B1 (ko) 2011-12-23 2015-05-22 주식회사 케이티 휴대 단말에서 외부 디스플레이 기기로의 화면 표출 방법 및 그 휴대 단말
KR101546407B1 (ko) 2011-12-23 2015-08-24 주식회사 케이티 어플리케이션 실행 제어 방법 및 장치
KR101522397B1 (ko) * 2011-12-26 2015-05-22 주식회사 케이티 복수의 외부 장치와 연결될 수 있는 휴대 단말 및 그 제어 방법
KR101504655B1 (ko) 2011-12-26 2015-03-23 주식회사 케이티 어플리케이션 실행 제어 방법 및 장치
JP2014036238A (ja) * 2012-08-07 2014-02-24 Hioki Ee Corp 測定装置
CN103975643B (zh) * 2012-11-30 2018-05-11 华为技术有限公司 认证方法和装置
KR20140146954A (ko) * 2013-06-18 2014-12-29 삼성전자주식회사 서비스 제공 방법 및 이를 위한 전자 기기
JP6028008B2 (ja) * 2014-09-12 2016-11-16 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America 情報機器の制御方法及びプログラム
KR102189648B1 (ko) * 2014-10-30 2020-12-11 삼성전자주식회사 디스플레이 장치, 이의 제어 방법 및 디스플레이 시스템
CN104821992B (zh) * 2015-05-25 2018-01-19 广东欧珀移动通信有限公司 一种手机自动切换网络连接类型的方法及装置
CN106201833A (zh) * 2016-06-30 2016-12-07 北京小米移动软件有限公司 WiFi信号图标的展示方法、装置和移动终端
JP6810555B2 (ja) * 2016-08-24 2021-01-06 キヤノン株式会社 無線通信装置およびその制御方法、ならびに無線通信システム
KR102025758B1 (ko) * 2018-06-05 2019-11-05 삼성전자주식회사 기기간 연결 제어 방법 및 그 장치

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2348568A (en) * 1999-03-31 2000-10-04 Ibm Enabling conformance to legislative requirements for mobile devices
WO2001008435A1 (fr) * 1999-07-21 2001-02-01 Swisscom Mobile Ag Procede et dispositifs adaptes destines a definir le niveau de securite de fonctions cryptographiques
EP1150531A2 (fr) * 2000-04-28 2001-10-31 Kabushiki Kaisha Toshiba Appareil de radiocommunication et son procédé d'authentication de l'utilisateur
CA2482185A1 (fr) * 2002-04-11 2003-10-16 International Business Machines Corporation Ordinateur, procede de reglage de la securite d'un ordinateur et programme correspondant

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6272538B1 (en) * 1996-07-30 2001-08-07 Micron Technology, Inc. Method and system for establishing a security perimeter in computer networks
US7167892B2 (en) * 1998-03-19 2007-01-23 Isochron, Inc. System, method and apparatus for vending machine wireless audit and cashless transaction transport
SE516779C2 (sv) * 1999-10-01 2002-02-26 Ericsson Telefon Ab L M Bärbar kommunikationsapparat med ett användargränssnitt samt en arbetsmetod för densamma
EP1158745B1 (fr) 2000-05-26 2003-09-03 International Business Machines Corporation Méthode et système avec accès universel et sécurisé
US6859879B2 (en) * 2000-05-26 2005-02-22 International Business Machine Corporation Method and system for secure pervasive access
JP2002185450A (ja) 2000-12-15 2002-06-28 Ntt Docomo Inc 無線アダプタ装置、初期接続認証方法及び無線機器
JP3551937B2 (ja) * 2001-02-28 2004-08-11 日本電気株式会社 移動通信システムにおける通信制御方法及びそれに使用する基地局
JP3764345B2 (ja) * 2001-03-19 2006-04-05 株式会社エヌ・ティ・ティ・ドコモ 移動通信端末装置及びサーバ装置
FR2825869B1 (fr) * 2001-06-08 2003-10-03 France Telecom Procede d'authentification entre un objet de telecommunication portable et une borne d'acces public
US8347104B2 (en) * 2001-12-26 2013-01-01 Research In Motion Limited Security interface for a mobile device
US20050180343A1 (en) * 2002-03-12 2005-08-18 Van Valkenburg Sander Method and device for wireless network formation
US7162277B2 (en) * 2003-10-14 2007-01-09 Partner Tech Corp. Wireless earphone with built-in mobile communications module and dial-up method of the same
US7941665B2 (en) * 2003-12-05 2011-05-10 Hewlett-Packard Development Company, L.P. Device pairing
US7124222B2 (en) * 2003-12-16 2006-10-17 1X1 Mobile, Ltd. Control system and method for a communications interface
US7721326B2 (en) * 2005-02-10 2010-05-18 France Telecom Automatic authentication selection server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2348568A (en) * 1999-03-31 2000-10-04 Ibm Enabling conformance to legislative requirements for mobile devices
WO2001008435A1 (fr) * 1999-07-21 2001-02-01 Swisscom Mobile Ag Procede et dispositifs adaptes destines a definir le niveau de securite de fonctions cryptographiques
EP1150531A2 (fr) * 2000-04-28 2001-10-31 Kabushiki Kaisha Toshiba Appareil de radiocommunication et son procédé d'authentication de l'utilisateur
CA2482185A1 (fr) * 2002-04-11 2003-10-16 International Business Machines Corporation Ordinateur, procede de reglage de la securite d'un ordinateur et programme correspondant

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012114906A (ja) * 2010-11-22 2012-06-14 Samsung Electronics Co Ltd 携帯用端末機におけるアクセスポイント接続装置及びその方法
EP2456264A3 (fr) * 2010-11-22 2015-01-28 Samsung Electronics Co., Ltd. Appareil et procédé de connexion d'un point d'accès dans un terminal portable
US9107143B2 (en) 2010-11-22 2015-08-11 Samsung Electronics Co., Ltd Apparatus and method for connecting access point in portable terminal

Also Published As

Publication number Publication date
JP3817249B2 (ja) 2006-09-06
TW200605694A (en) 2006-02-01
EP1592195B1 (fr) 2014-12-31
US7716475B2 (en) 2010-05-11
CN1691812A (zh) 2005-11-02
JP2005318298A (ja) 2005-11-10
US20050257052A1 (en) 2005-11-17
EP1592195A3 (fr) 2009-06-17
TWI263452B (en) 2006-10-01
ES2533831T3 (es) 2015-04-15

Similar Documents

Publication Publication Date Title
EP1592195B1 (fr) Station mobile et procédé de contrôle de communications
RU2636524C2 (ru) Способ, устройство и система для управления административной связью между учетной записью и устройством
US7308256B2 (en) Mobile communication terminal, information processing apparatus, relay server apparatus, information processing system, and information processing method
EP1395002A1 (fr) Dispositif pour exécuter une communication sans fil et procédé de contrôle de communication sans fil destiné à être appliqué au dispositif
US20190306688A1 (en) Network Access Method, Device, and System
EP3484196B1 (fr) Procédé et appareil d'enregistrement d'un dispositif sans fil dans un système de communication sans fil
EP1589723B1 (fr) Dispositif capable de modifier son comportement en fonction des dispositifs environnants
KR20090086628A (ko) 디바이스의 자동 지역화
US20110014905A1 (en) Querying a user of a mobile communication device
KR20060039810A (ko) 블루투스 기기에서 보안 모니터링 방법
US20150236922A1 (en) System and Method for Interface Content Transfer and Display, and Terminal
US20170347249A1 (en) Method and device for identifying short messages from pseudo base stations
CN106714181B (zh) 连入WiFi热点的方法及装置
KR101528851B1 (ko) Apc 및 그 제어방법과, 그 제어방법을 실행하기 위한 프로그램을 기록한 기록 매체
CN111970312A (zh) 文件传输方法、装置及计算机可读存储介质
CN108513010B (zh) 终端解锁方法、终端及计算机可读存储介质
US7474888B1 (en) Method for bypassing passkey exchange and authentication procedures
CN105429800A (zh) 网络连接的处理方法、装置和终端设备
KR101921207B1 (ko) 근거리 통신을 이용한 휴대 단말기의 기능 수행 방법 및 장치
KR102148696B1 (ko) 서비스 협상 방법 및 장치
CN112333062A (zh) 家居设备的控制方法、控制装置及计算机可读存储介质
US20160253136A1 (en) Image Processing Apparatus Configured to Perform Image Processing Using Setting Information
CN101390365A (zh) 在UPnP搜索服务中发现设备所有者的增强
KR102390887B1 (ko) 무선 통신 시스템에서 무선 기기 등록 방법 및 장치
KR20160080701A (ko) 위치에 기반한 복수개의 보안 정책 운용을 위한 사용자 단말기 제어 시스템 및 방법

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20050421

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR LV MK YU

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Kind code of ref document: A3

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR LV MK YU

AKX Designation fees paid

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

17Q First examination report despatched

Effective date: 20100511

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTG Intention to grant announced

Effective date: 20140730

RIN1 Information on inventor provided before grant (corrected)

Inventor name: KAKUNO, KOSUKE, INT.PRO. DPT., NTT DOCOMO INC.

Inventor name: SHIBUTANI, AKIRA, INT.PRO. DPT., NTT DOCOMO INC.

Inventor name: OL, TATSURO, INT. PROP. DPT., NTT DOCOMO, INC.

Inventor name: ASAI, MAO, INT. PROP. DPT., NTT DOCOMO, INC.

Inventor name: NAKATSUCHI, MASAHARU, I.P.D., NTT DOCOMO INC.

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

RIN1 Information on inventor provided before grant (corrected)

Inventor name: ASAI, MAO, INT. PROP. DPT., NTT DOCOMO, INC.

Inventor name: KAKUNO, KOSUKE, INT.PRO. DPT., NTT DOCOMO INC.

Inventor name: NAKATSUCHI, MASAHARU, I.P.D., NTT DOCOMO INC.

Inventor name: OI, TATSURO, INT. PROP. DPT., NTT DOCOMO, INC.

Inventor name: SHIBUTANI, AKIRA, INT.PRO. DPT., NTT DOCOMO INC.

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 704951

Country of ref document: AT

Kind code of ref document: T

Effective date: 20150215

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602005045546

Country of ref document: DE

Effective date: 20150219

REG Reference to a national code

Ref country code: NL

Ref legal event code: T3

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2533831

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20150415

REG Reference to a national code

Ref country code: GR

Ref legal event code: EP

Ref document number: 20150400446

Country of ref document: GR

Effective date: 20150318

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141231

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141231

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141231

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 704951

Country of ref document: AT

Kind code of ref document: T

Effective date: 20141231

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141231

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141231

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141231

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141231

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150430

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141231

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602005045546

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141231

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141231

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150421

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141231

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

26N No opposition filed

Effective date: 20151001

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20150430

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20150430

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141231

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 12

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20150421

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 13

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20050421

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141231

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141231

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20150501

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20141231

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 14

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20200312

Year of fee payment: 16

Ref country code: GR

Payment date: 20200310

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: BE

Payment date: 20200316

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20200312

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20200408

Year of fee payment: 16

Ref country code: ES

Payment date: 20200504

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20200312

Year of fee payment: 16

Ref country code: GB

Payment date: 20200408

Year of fee payment: 16

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 602005045546

Country of ref document: DE

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 602005045546

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: H04L0029060000

Ipc: H04L0065000000

REG Reference to a national code

Ref country code: NL

Ref legal event code: MM

Effective date: 20210501

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20210421

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20210430

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210430

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210421

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20211103

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20211108

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210501

REG Reference to a national code

Ref country code: ES

Ref legal event code: FD2A

Effective date: 20220701

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210422

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20210430

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200421